PYSEC-2022-43072

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/chia-blockchain/PYSEC-2022-43072.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2022-43072
Aliases
Published
2022-07-29T21:15:00Z
Modified
2024-11-25T22:42:02.057936Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted tokens minted on the Chia blockchain using the CAT1 standard can be inflated to an arbitrary extent by any holder of any amount of the token. The total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chia blockchain regardless of issuance rules. This attack is auditable on chain, so maliciously altered coins can potentially be marked by off-chain observers as malicious.

References

Affected packages

PyPI / chia-blockchain

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.4.4rc3

Affected versions

0.*

0.1

1.*

1.0b1
1.0b2
1.0b3
1.0b4
1.0b5
1.0b6
1.0b7
1.0b8
1.0b9
1.0b10
1.0b11
1.0b12.dev117
1.0b12
1.0b13
1.0b14
1.0b15
1.0b16
1.0b17
1.0b18
1.0b19
1.0b20
1.0b21
1.0b22
1.0b23
1.0b26
1.0b27
1.0rc1
1.0rc2
1.0rc3
1.0rc4
1.0rc5
1.0rc6
1.0rc7
1.0rc8
1.0rc9
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10
1.2.11
1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4.0
1.5.0
1.5.1
1.6.0
1.6.1rc1
1.6.1rc3
1.6.1rc4
1.6.1rc5
1.6.1rc6
1.6.1
1.6.2rc1
1.6.2
1.7.0b1
1.7.0b2
1.7.0b3
1.7.0b4
1.7.0b5
1.7.0b6
1.7.0rc1
1.7.0rc2
1.7.0rc3
1.7.0rc4
1.7.0rc5
1.7.0rc6
1.7.0rc7
1.7.0rc8
1.7.0rc9
1.7.0
1.7.1rc1
1.7.1rc2
1.7.1rc3
1.7.1
1.8.0b1
1.8.0b2
1.8.0b3
1.8.0b4
1.8.0b5
1.8.0b6
1.8.0rc1
1.8.0rc2
1.8.0rc3
1.8.0rc4
1.8.0rc5
1.8.0
1.8.1rc1
1.8.1rc2
1.8.1rc3
1.8.1rc4
1.8.1
1.8.2rc1
1.8.2rc3
1.8.2rc4
1.8.2rc5
1.8.2rc6
1.8.2
1.8.3rc1

2.*

2.0.0b1
2.0.0b3
2.0.0b4
2.0.0b5
2.0.0rc1
2.0.0rc2
2.0.0rc3
2.0.0rc4
2.0.0rc5
2.0.0rc6
2.0.0
2.0.1b1
2.0.1b2
2.0.1rc1
2.0.1
2.1.0rc1
2.1.0rc2
2.1.0rc3
2.1.0rc4
2.1.0rc5
2.1.0
2.1.1rc1
2.1.1
2.1.2rc1
2.1.2rc2
2.1.2rc3
2.1.2rc4
2.1.2
2.1.3rc1
2.1.3
2.1.4rc1
2.1.4rc2
2.1.4
2.2.0rc1
2.2.0rc2
2.2.0rc3
2.2.0rc4
2.2.0
2.2.1
2.3.0rc1
2.3.0rc2
2.3.0rc3
2.3.0rc4
2.3.0
2.3.1rc1
2.3.1
2.4.0rc1
2.4.0rc2
2.4.0rc3
2.4.0
2.4.1rc1
2.4.2
2.4.3b1
2.4.3b2
2.4.3rc1
2.4.3rc2
2.4.3rc3
2.4.3
2.4.4rc1
2.4.4rc2
2.4.4rc3